A Novel Method for Anomaly Detection in the Internet of Things using Whale Optimization Algorithm

被引:0
|
作者
Zhu, Zhihui [1 ]
Zhu, Meifang [2 ]
机构
[1] Guangzhou Maritime Univ, Guangzhou 510725, Guangdong, Peoples R China
[2] Guangdong Lingnan Inst Technol, Guangzhou 511510, Guangdong, Peoples R China
关键词
Internet of things; anomaly detection; intrusion detection; firewall; whale optimization algorithm; accuracy;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Internet of Things (IoT) is integral to human life due to its pervasive applications in home appliances, surveillance, and environment monitoring. Resource-constrained IoT devices are easily accessible to attackers due to their direct connection to the unsafe Internet. Public access to the Internet makes IoT objects more susceptible to intrusion. As the name implies, anomaly detection systems are designed to identify anomalous traffic patterns that conventional firewalls fail to detect. Effective Intrusion Detection Systems (IDSs) design faces three major problems, including handling high dimensionality, selecting a learning algorithm, and comparing entered observations and traffic patterns using a distance or similarity measure. Considering the dynamic nature of the entities involved and the limited computing resources available, more than traditional anomaly detection approaches is required. This paper proposes a novel method based on Whale Optimization Algorithm (WOA) to detect anomalies in IoT-based networks that conventional firewall systems cannot detect. Experiments are conducted on the KDD dataset. The accuracy of the proposed method is compared for classifiers such as kNN, SVM, and DT approaches. The detection accuracy rate of the proposed method is significantly higher than that of other methods for DoS, probing, normal attacks, R2L attacks, and U2R attacks compared to other methods. This method shows an impressive increase in accuracy when detecting a wide range of malicious activities, from DoS, probing, and privilege escalation attacks, to remote-to-local and user-to-root attacks.
引用
收藏
页码:765 / 773
页数:9
相关论文
共 50 条
  • [41] A Survey on Explainable Anomaly Detection for Industrial Internet of Things
    Huang, Zijie
    Wu, Yulei
    [J]. 2022 5TH IEEE CONFERENCE ON DEPENDABLE AND SECURE COMPUTING (IEEE DSC 2022), 2022,
  • [42] Soft Voting for Anomaly Detection in Internet of Medical Things
    Salem, Osman
    Mehaoua, Ahmed
    Boutaba, Raouf
    [J]. IEEE CONFERENCE ON GLOBAL COMMUNICATIONS, GLOBECOM, 2023, : 498 - 503
  • [43] A Novel HTTP Anomaly Detection Framework Based on Edge Intelligence for the Internet of Things (IoT)
    An, Yufei
    Li, Jianqiang
    Yu, F. Richard
    Chen, Jianyong
    Leung, Victor C. M.
    [J]. IEEE WIRELESS COMMUNICATIONS, 2021, 28 (02) : 159 - 165
  • [44] Federated deep learning for anomaly detection in the internet of things
    Wang, Xiaofeng
    Wang, Yonghong
    Javaheri, Zahra
    Almutairi, Laila
    Moghadamnejad, Navid
    Younes, Osama S.
    [J]. COMPUTERS & ELECTRICAL ENGINEERING, 2023, 108
  • [45] Botnet detection in the internet-of-things networks using convolutional neural network with pelican optimization algorithm
    Thota, Swapna
    Menaka, D.
    [J]. AUTOMATIKA, 2024, 65 (01) : 250 - 260
  • [46] A Statistical-Based Anomaly Detection Method for Connected Cars in Internet of Things Environment
    Han, Mee Lan
    Lee, Jin
    Kang, Ah Reum
    Kang, Sungwook
    Park, Jung Kyu
    Kim, Huy Kang
    [J]. INTERNET OF VEHICLES - SAFE AND INTELLIGENT MOBILITY, IOV 2015, 2015, 9502 : 89 - 97
  • [47] Metaheuristic algorithm for anomaly detection in Internet of Things leveraging on a neural-driven multiagent system
    Forestiero, Agostino
    [J]. KNOWLEDGE-BASED SYSTEMS, 2021, 228
  • [48] Sensors Anomaly Detection of Industrial Internet of Things Based on Isolated Forest Algorithm and Data Compression
    Liu, Desheng
    Zhen, Hang
    Kong, Dequan
    Chen, Xiaowei
    Zhang, Lei
    Yuan, Mingrun
    Wang, Hui
    [J]. SCIENTIFIC PROGRAMMING, 2021, 2021
  • [49] Optimization of Sensor Deployment for Industrial Internet of Things Using a Multiswarm Algorithm
    Hasan, Mohammed Zaki
    Al-Rizzo, Hussain
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (06) : 10344 - 10362
  • [50] Controller Placement in Software Defined Internet of Things Using Optimization Algorithm
    Hans, Sikander
    Ghosh, Smarajit
    Kataria, Aman
    Karar, Vinod
    Sharma, Sarika
    [J]. CMC-COMPUTERS MATERIALS & CONTINUA, 2022, 70 (03): : 5073 - 5089